Content protected from screenshots
Question

What is a honeypot in cybersecurity?